milly5797 milly5797
  • 25-01-2024
  • Computers and Technology
contestada

A developer is looking at establishing access control for an API that connects to a Lambda function downstream.
Which of the following represents a mechanism that CANNOT be used for authenticating with the API Gateway?
A. API Key
B. AWS Identity and Access Management (IAM)
C. OAuth 2.0
D. X.509 client certificates

Respuesta :

Otras preguntas

the tens digit of a two digit number is twice the units digit. The sum of the digits is twelve. Find the original number.
john left his home and walked 3 blocks to his school , as shown in the accompanying graph . what is one possible interpretation of the section of the graph from
What is 8x=9-5y ,8x-3y=-31
Which method of separation can be used for a heterogeneous mixture? A. by distillation B. by densities C. by chromatography D. by acidification
How do you describe how sugar dissolves in tea using the big idea of particles?
Why was the first pyramid built
What is the types of kinetic eneygy
factor the sum of terms as a product of the GCF and a sum: 60+48 what is the ansawer?
At current rate of use.known supplies of oil and natural gas may run out in less than ---- year? A.10. B.100. C.500. D .1,000
variables give three possible values for n numbers GCF 9,n 3